• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 82
Next 10 →

Benchmark Analysis

by Michael D. Hendricks, Robert D. Franzosa, Professor Of Mathematics, D. Hendricks - of MCNP ENDF/B-VI Iron”, LA-12884, Los Alamos National Laboratory , 1994
"... Wayfinders typically travel in dynamic environments where barriers and requirements change over time. In many cases, uncertainty exists about the future state of this changing environment. Current geographic information systems lack tools to assist wayfinders in understanding the travel possibilitie ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
possibilities and path selection options in these dynamic and uncertain settings. The goal of this research is a better understanding of the impact of dynamic and uncertain environments on wayfinding travel possibilities. An integrated spatio-temporal framework, populated with barriers and requirements, models

Materials for an exploratory theory of the network society.

by Manuel Castells , Anthony Giddens , Alain Touraine , Anthony Smith , Benjamin Barber , Peter Hall , Roger-Pol Droit , Sophie Watson , Frank Webster , Krishan Kumar , David Lyon , Craig Calhoun , Jeffrey Henderson , Ramon Ramos , Jose E Rodrigues-Ibanez , Jose F Tezanos , Mary Kaldor , Stephen Jones , Christopher Freeman - The British Journal of Sociology , 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract - Cited by 122 (0 self) - Add to MetaCart
of her/his/their action. The consolidation of shared meaning through cr ystallization of practices in spatio-temporal con gurations creates cultures, that is systems of values and beliefs informing codes of behaviour. There is no systemic dominance in this matrix of relationships. There are all layers

QOS WITH RELIABILITY AND SCALABILITY IN ADAPTIVE SERVICE-BASED SYSTEMS

by V. Rhymend, Uthariaraj P. Mercy, Florence A. Geetha
"... Service-based systems that are dynamically composed at runtime to provide complex, adaptive functionality are currently one of the main development paradigms in software engineering. However, the Quality of Service (QoS) delivered by these systems remains an important concern, and needs to be manage ..."
Abstract - Add to MetaCart
that achieve their QoS requirements through dynamically adapting to changes in the system state, environment, and workload. QoSMOS service-based systems translate high-level QoS requirements specified by their administrators into probabilistic temporal logic formulae, which are then formally and automatically

Probabilistic verification at runtime for self-adaptive systems

by Antonio Filieri , Giordano Tamburrelli - Institute for Software Technology (ISTE) University of Stuttgart , 2013
"... Abstract. An effective design of effective and efficient self-adaptive systems may rely on several existing approaches. Software models and model checking techniques at run time represent one of them since they support automatic reasoning about such changes, detect harmful configurations, and poten ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
-time model checking represents a crucial research challenge. This paper precisely addresses this issue and focuses on probabilistic run-time model checking in which reliability models are given in terms of Discrete Time Markov Chains which are verified at run-time against a set of requirements expressed

Diagnosing the Weakest Link in WSN Testbeds: A Reliability and Cost Analysis

by Of The Usb Backchannel, Pablo E. Guerrero, Iliya Gurov, Ro Buchmann, Technische Universität Darmstadt, Kristof Van Laerhoven, Technische Universität Darmstadt
"... Abstract—This paper highlights and characterizes the main obstacle to deploying a robust wireless sensor network testbed: the USB connections that link each of the nodes via ethernet gateways to the central server. Unfortunately, these connections are also the components that, when properly installe ..."
Abstract - Add to MetaCart
installed, can reduce testbed costs by attaching multiple nodes per gateway. After illustrating how unreliable current solutions can become (regardless of the used sensor nodes, USB cabling, or gateway setup), a set of experiments led to a list of dos and don’ts in testbed deployment. Furthermore, a simple

Automated Testing of Büchi Automata Translators for Linear Temporal Logic

by Ab Teknillinen Korkeakoulu, Tekniska Hgskolan, Universite De, Teknillinen Korkeakoulu, Heikki Tauriainen, Heikki Tauriainen, Heikki Tauriainen , 2000
"... The formal verification of finite-state reactive and concurrent systems against temporal logical requirements can be done by model checking, which has the advantage of being well suited for automation. However, reasoning about the correctness of systems using automated techniques places high demands ..."
Abstract - Add to MetaCart
The formal verification of finite-state reactive and concurrent systems against temporal logical requirements can be done by model checking, which has the advantage of being well suited for automation. However, reasoning about the correctness of systems using automated techniques places high

Performance Analysis of ARQ Protocols using a Theorem Prover

by Osman Hasan, Sofiène Tahar
"... Automatic-repeat-request (ARQ) protocols are widely used in modern data communications to guarantee reliable transmission over imperfect physical links. The behavior of an ARQ protocol largely depends on a number of network parameters and traditionally simulation is used for their performance analys ..."
Abstract - Cited by 4 (3 self) - Add to MetaCart
Automatic-repeat-request (ARQ) protocols are widely used in modern data communications to guarantee reliable transmission over imperfect physical links. The behavior of an ARQ protocol largely depends on a number of network parameters and traditionally simulation is used for their performance

3esis Supervisor Accepted by

by Audio-based Localisation, Benjamin Christopher Dalton, V. Michael, Benjamin Christopher Dalton , 2005
"... in partial ful2llment of the requirements for the degree of ..."
Abstract - Add to MetaCart
in partial ful2llment of the requirements for the degree of

Lifting assertion and consistency checkers from single to multiple viewpoints

by Michael Huth , 2002
"... Using a priority preorder on requirements or specifications, we lift established property-verification techniques of threevalued model checking from single to multiple viewpoints. This lift guarantees a maximal degree of autonomy and accountability to single views, automatically synthesizes single-a ..."
Abstract - Cited by 8 (3 self) - Add to MetaCart
Using a priority preorder on requirements or specifications, we lift established property-verification techniques of threevalued model checking from single to multiple viewpoints. This lift guarantees a maximal degree of autonomy and accountability to single views, automatically synthesizes single-analysis

Formal Analysis of a Privacy-Preserving Billing Protocol

by Ro Arm, Roberto Carbone, Alessio Merlo
"... Abstract. We provide a formal model and a security analysis of the Private Billing Protocol. This formal analysis allowed us to spell out precisely the details of the protocol, the security assumptions as well as the expected security goals. For the formal analysis we used SATMC, a model checker for ..."
Abstract - Add to MetaCart
Abstract. We provide a formal model and a security analysis of the Private Billing Protocol. This formal analysis allowed us to spell out precisely the details of the protocol, the security assumptions as well as the expected security goals. For the formal analysis we used SATMC, a model checker
Next 10 →
Results 1 - 10 of 82
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University